| Publication | Date of Publication | Type |
|---|
| Two-round concurrent 2PC from sub-exponential LWE | 2024-08-30 | Paper |
| On the round complexity of fully secure solitary MPC with honest majority | 2024-08-02 | Paper |
| Refuting the dream XOR lemma via ideal obfuscation and resettable MPC | 2024-06-25 | Paper |
Round-optimal oblivious transfer and MPC from computational CSIDH Lecture Notes in Computer Science | 2023-11-24 | Paper |
Statistical security in two-party computation revisited Theory of Cryptography | 2023-08-14 | Paper |
| Secure MPC: laziness leads to GOD | 2023-03-29 | Paper |
| Efficient and tight oblivious transfer from PKE with tight multi-user security | 2022-11-09 | Paper |
| BETA: biometric-enabled threshold authentication | 2021-12-21 | Paper |
| Multi-party threshold private set intersection with sublinear communication | 2021-12-21 | Paper |
| Statistical ZAP arguments | 2021-12-01 | Paper |
| Output compression, MPC, and iO for Turing machines | 2020-05-20 | Paper |
| UC-secure multiparty computation from one-way functions using stateless tokens | 2020-05-05 | Paper |
| From FE combiners to secure MPC and back | 2020-04-30 | Paper |
| Revisiting non-malleable secret sharing | 2020-02-04 | Paper |
Succinct delegation for low-space non-deterministic computation Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing | 2019-08-22 | Paper |
| Non-interactive secure computation from one-way functions | 2019-01-23 | Paper |
| Upgrading to functional encryption | 2018-12-11 | Paper |
| Promise zero knowledge and its applications to round optimal MPC | 2018-09-26 | Paper |
| Two-message witness indistinguishability and secure computation in the plain model from new assumptions | 2018-02-23 | Paper |
| Round optimal concurrent MPC via strong simulation | 2018-01-19 | Paper |
Unconditional UC-secure computation with (stronger-malicious) PUFs Lecture Notes in Computer Science | 2017-06-13 | Paper |
Verifiable functional encryption Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Multi-input functional encryption for unbounded arity functions Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
On the practical security of inner product functional encryption Lecture Notes in Computer Science | 2015-08-27 | Paper |
A sensitivity analysis for the optimal design of metal-forming processes Computer Methods in Applied Mechanics and Engineering | 1997-01-15 | Paper |